scispace - formally typeset
Search or ask a question

Showing papers on "Routing protocol published in 2007"


01 Feb 2007
TL;DR: The Dynamic Source Routing protocol is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes, designed to work well even with very high rates of mobility.
Abstract: The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. DSR allows the network to be completely self-organizing and self-configuring, without the need for any existing network infrastructure or administration. The protocol is composed of the two mechanisms of "Route Discovery" and "Route Maintenance", which work together to allow nodes to discover and maintain source routes to arbitrary destinations in the ad hoc network. The use of source routing allows packet routing to be trivially loop-free, avoids the need for up-to-date routing information in the intermediate nodes through which packets are forwarded, and allows nodes forwarding or overhearing packets to cache the routing information in them for their own future use. All aspects of the protocol operate entirely on-demand, allowing the routing packet overhead of DSR to scale automatically to only that needed to react to changes in the routes currently in use. This document specifies the operation of the DSR protocol for routing unicast IP packets in multi-hop wireless ad hoc networks.

1,649 citations


Proceedings ArticleDOI
09 Sep 2007
TL;DR: SimBet Routing is proposed which exploits the exchange of pre-estimated "betweenness' centrality metrics and locally determined social "similarity' to the destination node and outperforms PRoPHET Routing, particularly when the sending and receiving nodes have low connectivity.
Abstract: Message delivery in sparse Mobile Ad hoc Networks (MANETs) is difficult due to the fact that the network graph is rarely (if ever) connected. A key challenge is to find a route that can provide good delivery performance and low end-to-end delay in a disconnected network graph where nodes may move freely. This paper presents a multidisciplinary solution based on the consideration of the so-called small world dynamics which have been proposed for economy and social studies and have recently revealed to be a successful approach to be exploited for characterising information propagation in wireless networks. To this purpose, some bridge nodes are identified based on their centrality characteristics, i.e., on their capability to broker information exchange among otherwise disconnected nodes. Due to the complexity of the centrality metrics in populated networks the concept of ego networks is exploited where nodes are not required to exchange information about the entire network topology, but only locally available information is considered. Then SimBet Routing is proposed which exploits the exchange of pre-estimated "betweenness' centrality metrics and locally determined social "similarity' to the destination node. We present simulations using real trace data to demonstrate that SimBet Routing results in delivery performance close to Epidemic Routing but with significantly reduced overhead. Additionally, we show that SimBet Routing outperforms PRoPHET Routing, particularly when the sending and receiving nodes have low connectivity.

1,232 citations


Proceedings ArticleDOI
27 Aug 2007
TL;DR: More as mentioned in this paper is a MAC-independent opportunistic routing protocol, which randomly mixes packets before forwarding them to ensure that routers that hear the same transmission do not forward the same packets, thus, it needs no special scheduler to coordinate routers and can run directly on top of 802.11.
Abstract: Opportunistic routing is a recent technique that achieves high throughput in the face of lossy wireless links. The current opportunistic routing protocol, ExOR, ties the MAC with routing, imposing a strict schedule on routers' access to the medium. Although the scheduler delivers opportunistic gains, it misses some of the inherent features of the 802.11 MAC. For example, it prevents spatial reuse and thus may underutilize the wireless medium. It also eliminates the layering abstraction, making the protocol less amenable to extensions to alternate traffic types such as multicast.This paper presents MORE, a MAC-independent opportunistic routing protocol. MORE randomly mixes packets before forwarding them. This randomness ensures that routers that hear the same transmission do not forward the same packets. Thus, MORE needs no special scheduler to coordinate routers and can run directly on top of 802.11. Experimental results from a 20-node wireless testbed show that MORE's median unicast throughput is 22% higher than ExOR, and the gains rise to 45% over ExOR when there is a chance of spatial reuse. For multicast, MORE's gains increase with the number of destinations, and are 35-200% greater than ExOR.

1,198 citations


Proceedings ArticleDOI
27 Aug 2007
TL;DR: RAPID is presented, an intentional DTN routing protocol that can optimize a specific routing metric such as worst-case delivery latency or the fraction of packets that are delivered within a deadline and significantly outperforms existing routing protocols for several metrics.
Abstract: Many DTN routing protocols use a variety of mechanisms, including discovering the meeting probabilities among nodes, packet replication, and network coding. The primary focus of these mechanisms is to increase the likelihood of finding a path with limited information, so these approaches have only an incidental effect on such routing metrics as maximum or average delivery latency. In this paper, we present RAPID, an intentional DTN routing protocol that can optimize a specific routing metric such as worst-case delivery latency or the fraction of packets that are delivered within a deadline. The key insight is to treat DTN routing as a resource allocation problem that translates the routing metric into per-packet utilities which determine how packets should be replicated in the system.We evaluate RAPID rigorously through a prototype of RAPID deployed over a vehicular DTN testbed of 40 buses and simulations based on real traces. To our knowledge, this is the first paper to report on a routing protocol deployed on a real DTN at this scale. Our results suggest that RAPID significantly outperforms existing routing protocols for several metrics. We also show empirically that for small loads RAPID is within 10% of the optimal performance.

1,078 citations


Proceedings ArticleDOI
01 May 2007
TL;DR: This work presents a position-based routing scheme called Connectivity-Aware Routing (CAR), designed specifically for inter-vehicle communication in a city and/or highway environment, with the ability to not only locate positions of destinations but also to find connected paths between source and destination pairs.
Abstract: Vehicular ad hoc networks using WLAN technology have recently received considerable attention. We present a position-based routing scheme called Connectivity-Aware Routing (CAR) designed specifically for inter-vehicle communication in a city and/or highway environment. A distinguishing property of CAR is the ability to not only locate positions of destinations but also to find connected paths between source and destination pairs. These paths are auto-adjusted on the fly, without a new discovery process. "Guards" help to track the current position of a destination, even if it traveled a substantial distance from its initially known location. For the evaluation of the CAR protocol we use realistic mobility traces obtained from a microscopic vehicular traffic simulator that is based on a model of driver behavior and the real road maps of Switzerland.

554 citations


Journal ArticleDOI
TL;DR: This paper uses empirical vehicle traffic data measured on 1-80 freeway in California to develop a comprehensive analytical framework to study the disconnected network phenomenon and its network characteristics, and shows that, depending on the sparsity of vehicles or the market penetration rate of cars using Dedicated Short Range Communication technology, the network re-healing time can vary from a few seconds to several minutes.
Abstract: A vehicular ad hoc network (VANET) may exhibit a bipolar behavior, i.e., the network can either be fully connected or sparsely connected depending on the time of day or on the market penetration rate of the wireless communication devices. In this paper, we use empirical vehicle traffic data measured on 1-80 freeway in California to develop a comprehensive analytical framework to study the disconnected network phenomenon and its network characteristics. These characteristics shed light on the key routing performance metrics of interest in disconnected VANETs, such as the average time taken to propagate a packet to disconnected nodes (i.e., the re-healing time). Our results show that, depending on the sparsity of vehicles or the market penetration rate of cars using Dedicated Short Range Communication (DSRC) technology, the network re-healing time can vary from a few seconds to several minutes. This suggests that, for vehicular safety applications, a new ad hoc routing protocol will be needed as the conventional ad hoc routing protocols such as Dynamic Source Routing (DSR) and Ad Hoc On-Demand Distance Vector Routing (AODV) will not work with such long re-healing times. In addition, the developed analytical framework and its predictions provide valuable insights into the VANET routing performance in the disconnected network regime.

534 citations


Journal ArticleDOI
TL;DR: This paper discusses and compares different signalling and routing methods for multiple-input multiple-output (MIMO) relay networks in terms of the network capacity, where every terminal is equipped with multiple antennas and proposes both optimal and suboptimal relay selection schemes.
Abstract: In this paper we discuss and compare different signalling and routing methods for multiple-input multiple-output (MIMO) relay networks in terms of the network capacity, where every terminal is equipped with multiple antennas. Our study for signalling includes the two well known digital (decode and forward) relaying, analogue (amplify and forward) relaying, and a novel hybrid (filter, amplify and forward) relaying. We propose both optimal and suboptimal hybrid relaying schemes which avoid full decoding of the message at the relay. We show that they outperform analogue relaying and give similar performance to digital relaying, particularly when the relay has forward channel state information (CSI) or larger number of antennas than the source and destination. For the routing schemes designed for multiple relay channels, we use relay selection schemes to exploit the spatial diversity, which we call selection diversity of the networks. We propose both optimal and suboptimal relay selection schemes and show that their performance converges when a large number of antennas is deployed at each node in the network. We also compare relay selection routing with a space-time coded relay cooperation protocol and show the performance advantage of selection diversity over cooperative diversity in certain scenarios. Finally, we give a brief discussion on the application of another MIMO structure called single signal beamforming in the relay scenario. Its performance will be compared with that of spatial multiplexing

487 citations


Journal ArticleDOI
TL;DR: The main idea of the 2ACK scheme is to send two-hop acknowledgment packets in the opposite direction of the routing path in order to reduce additional routing overhead.
Abstract: We study routing misbehavior in MANETs (mobile ad hoc networks) in this paper. In general, routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist. One such routing misbehavior is that some selfish nodes will participate in the route discovery and maintenance processes but refuse to forward data packets. In this paper, we propose the 2ACK scheme that serves as an add-on technique for routing schemes to detect routing misbehavior and to mitigate their adverse effect. The main idea of the 2ACK scheme is to send two-hop acknowledgment packets in the opposite direction of the routing path. In order to reduce additional routing overhead, only a fraction of the received data packets are acknowledged in the 2ACK scheme. Analytical and simulation results are presented to evaluate the performance of the proposed scheme

485 citations


01 Jan 2007
TL;DR: In this paper, the authors investigate the state-of-the-art of security issues in MANET and examine routing attacks, such as link spoofing and colluding misrelay attacks, as well as countermeasures against such attacks.
Abstract: Recently, mobile ad hoc networks became a hot research topic among researchers due to their flexibility and independence of network infrastructures, such as base stations. Due to unique characteristics, such as dynamic network topology, limited bandwidth, and limited battery power, routing in a MANET is a particularly challenging task compared to a conventional network. Early work in MANET research has mainly focused on developing an efficient routing mechanism in such a highly dynamic and resource-constrained network. At present, several efficient routing protocols have been proposed for MANET. Most of these protocols assume a trusted and cooperative environment. However, in the presence of malicious nodes, the networks are vulnerable to various kinds of attacks. In MANET, routing attacks are particularly serious. In this article, we investigate the state-of-the-art of security issues in MANET. In particular, we examine routing attacks, such as link spoofing and colluding misrelay attacks, as well as countermeasures against such attacks in existing MANET protocols.

474 citations


Journal ArticleDOI
TL;DR: This article investigates the state-of-the-art of security issues in MANET and examines routing attacks, such as link spoofing and colluding misrelay attacks, as well as countermeasures against such attacks in existing MANET protocols.
Abstract: Recently, mobile ad hoc networks became a hot research topic among researchers due to their flexibility and independence of network infrastructures, such as base stations. Due to unique characteristics, such as dynamic network topology, limited bandwidth, and limited battery power, routing in a MANET is a particularly challenging task compared to a conventional network. Early work in MANET research has mainly focused on developing an efficient routing mechanism in such a highly dynamic and resource-constrained network. At present, several efficient routing protocols have been proposed for MANET. Most of these protocols assume a trusted and cooperative environment. However, in the presence of malicious nodes, the networks are vulnerable to various kinds of attacks. In MANET, routing attacks are particularly serious. In this article, we investigate the state-of-the-art of security issues in MANET. In particular, we examine routing attacks, such as link spoofing and colluding misrelay attacks, as well as countermeasures against such attacks in existing MANET protocols.

447 citations


Journal ArticleDOI
TL;DR: Simulation results indicate the benefits of the proposed routing strategy in terms of increasing link duration, reducing the number of link-breakage events and increasing the end-to-end throughput.
Abstract: There are numerous research challenges that need to be addressed until a wide deployment of vehicular ad hoc networks (VANETs) becomes possible. One of the critical issues consists of the design of scalable routing algorithms that are robust to frequent path disruptions caused by vehicles' mobility. This paper argues the use of information on vehicles' movement information (e.g., position, direction, speed, and digital mapping of roads) to predict a possible link-breakage event prior to its occurrence. Vehicles are grouped according to their velocity vectors. This kind of grouping ensures that vehicles, belonging to the same group, are more likely to establish stable single and multihop paths as they are moving together. Setting up routes that involve only vehicles from the same group guarantees a high level of stable communication in VANETs. The scheme presented in this paper also reduces the overall traffic in highly mobile VANET networks. The frequency of flood requests is reduced by elongating the link duration of the selected paths. To prevent broadcast storms that may be intrigued during path discovery operation, another scheme is also introduced. The basic concept behind the proposed scheme is to broadcast only specific and well-defined packets, referred to as ldquobest packetsrdquo in this paper. The performance of the scheme is evaluated through computer simulations. Simulation results indicate the benefits of the proposed routing strategy in terms of increasing link duration, reducing the number of link-breakage events and increasing the end-to-end throughput.

Proceedings ArticleDOI
25 Jun 2007
TL;DR: This paper presents and evaluates a software-based on-line energy estimation mechanism that estimates the energy consumption of a sensor node and evaluates the mechanism by comparing the estimated energy consumption with the lifetime of capacitor-powered sensor nodes.
Abstract: Energy is of primary importance in wireless sensor networks. By being able to estimate the energy consumption of the sensor nodes, applications and routing protocols are able to make informed decisions that increase the lifetime of the sensor network. However, it is in general not possible to measure the energy consumption on popular sensor node platforms. In this paper, we present and evaluate a software-based on-line energy estimation mechanism that estimates the energy consumption of a sensor node. We evaluate the mechanism by comparing the estimated energy consumption with the lifetime of capacitor-powered sensor nodes. By implementing and evaluating the X-MAC protocol, we show how software-based on-line energy estimation can be used to empirically evaluate the energy efficiency of sensor network protocols.

Proceedings ArticleDOI
18 Jun 2007
TL;DR: A forwarding protocol which exploits both the opportunistic nature and the inherent characteristics of the vehicular network in terms of mobility patterns and encounters, and the geographical information present in navigator systems of vehicles is presented.
Abstract: Vehicular networks can be seen as an example of hybrid delay tolerant network where a mixture of infostations and vehicles can be used to geographically route the information messages to the right location. In this paper we present a forwarding protocol which exploits both the opportunistic nature and the inherent characteristics of the vehicular network in terms of mobility patterns and encounters, and the geographical information present in navigator systems of vehicles. We also report about our evaluation of the protocol over a simulator using realistic vehicular traces and in comparison with other geographical routing protocols.

Journal ArticleDOI
TL;DR: A metric that estimates the average waiting time for each potential next hop is designed, which provides performance similar to that of schemes that have global knowledge of the network topology, yet without requiring that knowledge.
Abstract: Delay-tolerant networks (DTNs) have the potential to interconnect devices in regions that current networking technology cannot reach. To realize the DTN vision, routes must be found over multiple unreliable, intermittently-connected hops. In this paper we present a practical routing protocol that uses only observed information about the network. We designed a metric that estimates the average waiting time for each potential next hop. This learned topology information is distributed using a link-state routing protocol, where the link-state packets are "flooded" using epidemic routing. The routing is recomputed each time connections are established, allowing messages to take advantage of unpredictable contacts. A message is forwarded if the topology suggests that the connected node is "closer" to the destination than the current node. We demonstrate through simulation that our protocol provides performance similar to that of schemes that have global knowledge of the network topology, yet without requiring that knowledge. Further, it requires significantly less resources than the alternative, epidemic routing, suggesting that our approach scales better with the number of messages in the network. This performance is achieved with minimal protocol overhead for networks of approximately 100 nodes.

Journal ArticleDOI
TL;DR: Many DTN routing protocols use a variety of mechanisms, including discovering the meeting probabilities among nodes, packet replication, and network coding as mentioned in this paper, which is the primary focus of these mechanisms.
Abstract: Many DTN routing protocols use a variety of mechanisms, including discovering the meeting probabilities among nodes, packet replication, and network coding. The primary focus of these mechanisms is...

Proceedings ArticleDOI
01 May 2007
TL;DR: Simulation results in ns-2 show that RMAC achieves significant improvement in end-to-end delivery latency over S-MAC and can handle traffic contention much more efficiently than S- MAC, without sacrificing energy efficiency or network throughput.
Abstract: Duty-cycle MAC protocols have been proposed to meet the demanding energy requirements of wireless sensor networks. Although existing duty-cycle MAC protocols such as S-MAC are power efficient, they introduce significant end-to-end delivery latency and provide poor traffic contention handling. In this paper, we present a new duty-cycle MAC protocol, called RMAC (the routing enhanced MAC protocol), that exploits cross-layer routing information in order to avoid these problems without sacrificing energy efficiency. In RMAC, a setup control frame can travel across multiple hops and schedule the upcoming data packet delivery along that route. Each intermediate relaying node for the data packet along these hops sleeps and intelligently wakes up at a scheduled time, so that its upstream node can send the data packet to it and it can immediately forward the data packet to its downstream node. When wireless medium contention occurs, RMAC moves contention traffic away from the busy area by delivering data packets over multiple hops in a single cycle, helping to reduce the contention in the area quickly. Our simulation results in ns-2 show that RMAC achieves significant improvement in end-to-end delivery latency over S-MAC and can handle traffic contention much more efficiently than S-MAC, without sacrificing energy efficiency or network throughput.

Journal ArticleDOI
TL;DR: The current opportunistic routing protocol, ExOR as discussed by the authors, ties the MAC with routing, imposing a high throughput in the face of lossy wireless links, which is a recent technique that achieves high throughput.
Abstract: Opportunistic routing is a recent technique that achieves high throughput in the face of lossy wireless links. The current opportunistic routing protocol, ExOR, ties the MAC with routing, imposing ...

Proceedings ArticleDOI
01 May 2007
TL;DR: A novel time-variant community mobility model is proposed that defines communities that are visited often by the nodes to capture skewed location visiting preferences, and use time periods with different mobility parameters to create periodical re-appearance of nodes at the same location.
Abstract: Realistic mobility models are important to understand the performance of routing protocols in wireless ad hoc networks, especially when mobility-assisted routing schemes are employed, which is the case, for example, in delay-tolerant networks (DTNs). In mobility-assisted routing, messages are stored in mobile nodes and carried across the network with nodal mobility. Hence, the delay involved in message delivery is tightly coupled with the properties of nodal mobility. Currently, commonly used mobility models are simplistic random i.i.d. model that do not reflect realistic mobility characteristics. In this paper we propose a novel time-variant community mobility model. In this model, we define communities that are visited often by the nodes to capture skewed location visiting preferences, and use time periods with different mobility parameters to create periodical re-appearance of nodes at the same location. We have clearly observed these two properties based on analysis of empirical WLAN traces. In addition to the proposal of a realistic mobility model, we derive analytical expressions to highlight the impact on the hitting time and meeting times if these mobility characteristics are incorporated. These quantities in turn determine the packet delivery delay in mobility-assisted routing settings. Simulation studies show our expressions have error always under 20%, and in 80% of studied cases under 10%.

Proceedings ArticleDOI
25 Apr 2007
TL;DR: This paper proposes Dozer, a data gathering protocol meeting the requirements of periodic data collection and ultra-low power consumption, which comprises MAC-layer, topology control, and routing all coordinated to reduce energy wastage of the communication subsystem.
Abstract: Environmental monitoring is one of the driving applications in the domain of sensor networks. The lifetime of such systems is envisioned to exceed several years. To achieve this longevity in unattended operation it is crucial to minimize energy consumption of the battery-powered sensor nodes. This paper proposes Dozer, a data gathering protocol meeting the requirements of periodic data collection and ultra-low power consumption. The protocol comprises MAC-layer, topology control, and routing all coordinated to reduce energy wastage of the communication subsystem. Using a tree-based network structure, packets are reliably routed towards the data sink. Parents thereby schedule precise rendezvous times for all communication with their children. In a deployed network consisting of 40 TinyOS- enabled sensor nodes, Dozer achieves radio duty cycles in the magnitude of 0.2%.

Proceedings ArticleDOI
29 Oct 2007
TL;DR: The extent to which routing performance optimizations have left the system vulnerable to end-to-end traffic analysis attacks from non-global adversaries with minimal resources is shown.
Abstract: Tor has become one of the most popular overlay networks for anonymizing TCP traffic. Its popularity is due in part to its perceived strong anonymity properties and its relatively low latency service. Low latency is achieved through Tor's ability to balance the traffic load by optimizing Tor router selection to probabilistically favor routers with high bandwidth capabilities. We investigate how Tor's routing optimizations impact its ability to provide strong anonymity. Through experiments conducted on PlanetLab, we show the extent to which routing performance optimizations have left the system vulnerable to end-to-end traffic analysis attacks from non-global adversaries with minimal resources. Further, we demonstrate that entry guards, added to mitigate path disruption attacks, are themselves vulnerable to attack. Finally, we explore solutions to improve Tor's current routing algorithms and propose alternative routing strategies that prevent some of the routing attacks used in our experiments.

Journal ArticleDOI
TL;DR: This document offers an up-to-date survey of most major contributions to the pool of QoS routing solutions for MANETs published in the period 1997¿2006, including a thorough overview ofQoS routing metrics, resources, and factors affecting performance and classify the protocols found in the literature.
Abstract: In mobile ad hoc networks (MANETs), the provision of quality of service (QoS) guarantees is much more challenging than in wireline networks, mainly due to node mobility, multihop communications, contention for channel access, and a lack of central coordination. QoS guarantees are required by most multimedia and other time- or error-sensitive applications. The difficulties in the provision of such guarantees have limited the usefulness of MANETs. However, in the last decade, much research attention has focused on providing QoS assurances in MANET protocols. The QoS routing protocol is an integral part of any QoS solution since its function is to ascertain which nodes, if any, are able to serve applications? requirements. Consequently, it also plays a crucial role in data session admission control. This document offers an up-to-date survey of most major contributions to the pool of QoS routing solutions for MANETs published in the period 1997?2006. We include a thorough overview of QoS routing metrics, resources, and factors affecting performance and classify the protocols found in the literature. We also summarize their operation and describe their interactions with the medium access control (MAC) protocol, where applicable. This provides the reader with insight into their differences and allows us to highlight trends in protocol design and identify areas for future research.

Journal ArticleDOI
Philip A. Chou1, Yunnan Wu1
TL;DR: An overview of the theory, practice, and applications of network coding is provided, including resource efficiency, computational efficiency, and robustness to network dynamics.
Abstract: In today's practical communication networks such as the Internet, information delivery is performed by routing. A promising generalization of routing is network coding. The potential advantages of network coding over routing include resource (e.g., bandwidth and power) efficiency, computational efficiency, and robustness to network dynamics. This tutorial article provides an overview of the theory, practice, and applications of network coding.

Proceedings ArticleDOI
18 Jun 2007
TL;DR: This paper proposes a context-based protocol (HiBOp), and compares it with popular solutions, i.e., Epidemic Routing and PROPHET, to show that HiBOp is able to drastically reduce resource consumption and preserves the performance in terms of message delay.
Abstract: In opportunistic networks the existence of a simultaneous path between a sender and a receiver is not assumed. This model (which fits well to pervasive networking environments) completely breaks the main assumptions on which MANET routing protocols are built. Routing in opportunistic networks is usually based on some form of controlled flooding. But often this results in very high resource consumption and network congestion. In this paper we advocate context-based routing for opportunistic networks. We provide a general framework for managing and using context for taking forwarding decisions. We propose a context-based protocol (HiBOp), and compare it with popular solutions, i.e., Epidemic Routing and PROPHET. Results show that HiBOp is able to drastically reduce resource consumption. At the same time, it significantly reduces the message loss rate, and preserves the performance in terms of message delay.

Journal ArticleDOI
TL;DR: A prediction-based routing (PBR) protocol that is specifically tailored to the mobile gateway scenario and takes advantage of the predictable mobility pattern of vehicles on highways, which uses predicted route lifetimes to preemptively create new routes before existing ones fail.
Abstract: Development in short-range wireless LAN (WLAN) and long-range wireless WAN (WWAN) technologies have motivated recent efforts to integrate the two. This creates new application scenarios that were not possible before. Vehicles with only WLAN radios can use other vehicles that have both WLAN and WWAN radios as mobile gateways and connect to the Internet while on the road. The most difficult challenge in the scenario is to deal with frequent route breakages due to dynamic mobility of vehicles on the road. Existing routing protocols that are widely used for mobile ad hoc networks are reactive in nature and wait until existing routes break before constructing new routes. The frequent route failures result in a significant amount of time needed for repairing existing routes or reconstructing new routes. In spite of the dynamic mobility, the motion of vehicles on highways is quite predictable compared to other mobility patterns for wireless ad hoc networks, with location and velocity information readily available. This can be exploited to predict how long a route will last between a vehicle requiring Internet connectivity and the gateway that provides a route to the Internet. Successful prediction of route lifetimes can significantly reduce the number of route failures. In this paper, we introduce a prediction-based routing (PBR) protocol that is specifically tailored to the mobile gateway scenario and takes advantage of the predictable mobility pattern of vehicles on highways. The protocol uses predicted route lifetimes to preemptively create new routes before existing ones fail. We study the performance of this protocol through simulation and demonstrate significant reductions in route failures compared to protocols that do not use preemptive routing. Moreover, we find that the overhead of preemptive routing is kept in check due to the ability of PBR to predict route lifetimes.

Proceedings ArticleDOI
24 Jun 2007
TL;DR: This work proposes an inter-vehicle ad-hoc routing protocol called GyTAR (improved greedy traffic aware routing protocol) suitable for city environments and shows significant performance improvement in terms of packet delivery ratio, end-to-end delay, and routing overhead.
Abstract: The fundamental component for the success of VANET (vehicular ad hoc networks) applications is routing since it must efficiently handle rapid topology changes and a fragmented network. Current MANET (mobile ad hoc networks) routing protocols fail to fully address these specific needs especially in a city environments (nodes distribution, constrained but high mobility patterns, signal transmissions blocked by obstacles, etc.). In our current work, we propose an inter-vehicle ad-hoc routing protocol called GyTAR (improved greedy traffic aware routing protocol) suitable for city environments. GyTAR consists of two modules: (i) dynamic selection of the junctions through which a packet must pass to reach its destination, and (ii) an improved greedy strategy used to forward packets between two junctions. In this paper, we give detailed description of our approach and present its added value compared to other existing vehicular routing protocols. Simulation results show significant performance improvement in terms of packet delivery ratio, end-to-end delay, and routing overhead.

Proceedings ArticleDOI
21 May 2007
TL;DR: Evaluating the performance of reactive (AODV, DSR) and proactive (OLSR) routing protocols in MANETs under CBR traffic with different network conditions shows the superiority of proactive over reactive protocols in routing such traffic at the cost of a higher routing load.
Abstract: The mobility of nodes in mobile ad hoc networks (MANETs) results in frequent changes of network topology making routing in MANETs a challenging task. Some studies have been reported in the literature to evaluate the performance of the proposed routing algorithms. However, since the publication of experimental standards for some routing protocols by IETF, little activity has been done to contrast the performance of reactive against proactive protocols. This paper evaluates the performance of reactive (AODV, DSR) and proactive (OLSR) routing protocols in MANETs under CBR traffic with different network conditions. Our results, contrarily to previously reported studies conducted on the same routing protocols, show the superiority of proactive over reactive protocols in routing such traffic at the cost of a higher routing load.

Proceedings ArticleDOI
27 Aug 2007
TL;DR: Computer simulation using glomosim shows that the proposed protocol provides better performance than the conventional AODV in the presence of Black holes with minimal additional delay and Overhead.
Abstract: An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. It operates without the use of existing infrastructure. One of the principal routing protocols used in ad-hoc networks is AODV (ad-hoc on demand distance vector) protocol. The security of the AODV protocol is compromised by a particular type of attack called 'black hole' attack. In this attack a malicious node advertises itself as having the shortest path to the node whose packets it wants to intercept. To reduce the probability it is proposed to wait and check the replies from all the neighboring nodes to find a safe route. Computer simulation using glomosim shows that our protocol provides better performance than the conventional AODV in the presence of Black holes with minimal additional delay and Overhead.

Proceedings ArticleDOI
24 Jun 2007
TL;DR: A node analytical model is proposed to describe the scheduling-based channel assignment progress, which relief the inter-flow interference and frequent switching delay and an on-demand interaction is used to derive a cumulative delay based routing protocol.
Abstract: In cognitive radio networks, nodes can work on different frequency bands. Existing routing proposals help nodes select frequency bands without considering the effect of band switching and intra-band backoff. In this paper, We propose a joint interaction between on-demand routing and spectrum scheduling. A node analytical model is proposed to describe the scheduling-based channel assignment progress, which relief the inter-flow interference and frequent switching delay. We also use an on-demand interaction to derive a cumulative delay based routing protocol. Simulation results show that, comparing to other approaches, our protocol provides better adaptability to the multi- flow environment and derives paths with much lower cumulative delay.

Journal ArticleDOI
TL;DR: This paper demonstrates that, besides simplicity and robustness, with proper parameter settings, simple pull-based P2P streaming protocol is nearly optimal in terms of peer upload capacity utilization and system throughput even without intelligent scheduling and bandwidth measurement.
Abstract: Most of the real deployed peer-to-peer streaming systems adopt pull-based streaming protocol. In this paper, we demonstrate that, besides simplicity and robustness, with proper parameter settings, when the server bandwidth is above several times of the raw streaming rate, which is reasonable for practical live streaming system, simple pull-based P2P streaming protocol is nearly optimal in terms of peer upload capacity utilization and system throughput even without intelligent scheduling and bandwidth measurement. We also indicate that whether this near optimality can be achieved depends on the parameters in pull-based protocol, server bandwidth and group size. Then we present our mathematical analysis to gain deeper insight in this characteristic of pull-based streaming protocol. On the other hand, the optimality of pull-based protocol comes from a cost -tradeoff between control overhead and delay, that is, the protocol has either large control overhead or large delay. To break the tradeoff, we propose a pull-push hybrid protocol. The basic idea is to consider pull-based protocol as a highly efficient bandwidth-aware multicast routing protocol and push down packets along the trees formed by pull-based protocol. Both simulation and real-world experiment show that this protocol is not only even more effective in throughput than pull-based protocol but also has far lower delay and much smaller overhead. And to achieve near optimality in peer capacity utilization without churn, the server bandwidth needed can be further relaxed. Furthermore, the proposed protocol is fully implemented in our deployed GridMedia system and has the record to support over 220,000 users simultaneously online.

Journal ArticleDOI
TL;DR: The topology control problem and the design objectives are clearly presented, and an introduction is made to representative research efforts, along with analyses and comparisons, in two aspects, power control and sleep scheduling, respectively.
Abstract: Topology control is one of the most fundamental problems in wireless sensor networks. It is of great importance for prolonging network lifetime, reducing radio interference, increasing the efficiency of MAC (media access control) protocols and routing protocols, among other things. This paper makes a full-scale introduction to the advancement of research on topology control. Firstly, the topology control problem and the design objectives are clearly presented. Secondly, an introduction is made to representative research efforts, along with analyses and comparisons, in two aspects, power control and sleep scheduling, respectively. At the same time, the defects of those efforts are clearly pointed out. Finally, existing problems, open issues and research trends are analyzed and